BUDDINGPULVERS.exe
Created 5 years ago
VMRay Threat Identifiers (13 rules, 19 matches)
Severity | Category | Operation | Count | Classification | |
---|---|---|---|---|---|
4/5 | User Data Modification | Modifies Windows automatic backups | 1 | - | |
4/5 | Injection | Writes into the memory of another running process | 1 | - | |
4/5 | Injection | Modifies control flow of another process | 1 | - | |
3/5 | Anti Analysis | Tries to evade debugger | 1 | - | |
3/5 | YARA | Suspicious content matched by YARA rules | 2 | - | |
2/5 | Obfuscation | Resolves APIs dynamically to possibly evade static detection | 1 | - | |
2/5 | Anti Analysis | Creates an unusually large number of processes | 1 | - | |
2/5 | Anti Analysis | Makes direct system call to possibly evade hooking based sandboxes | 2 | - | |
1/5 | Hide Tracks | Creates process with hidden window | 5 | - | |
1/5 | Obfuscation | Creates a page with write and execute permissions | 1 | - | |
Screenshots
MITRE ATT&CK™ Matrix - Windows
Sample Information
ID | #834767 |
MD5 | |
SHA1 | |
SHA256 | |
SSDeep | |
ImpHash | |
Filename | BUDDINGPULVERS.exe |
File Size | 88.00 KB |
Sample Type | Windows Exe (x86-32) |
Analysis Information
Creation Time | 2020-05-09 23:05 (UTC+) |
Analysis Duration | 00:04:00 |
Number of Monitored Processes | 89 |
Execution Successful | ![]() |
Reputation Enabled | ![]() |
WHOIS Enabled | ![]() |
Local AV Enabled | ![]() |
Local AV Applied On | Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps |
YARA Enabled | ![]() |
YARA Applied On | Sample Files, PCAP File, Downloaded Files, Dropped Files, Modified Files, Memory Dumps |
Number of AV Matches | 0 |
Number of YARA Matches | 10 |
Termination Reason | Timeout |